Saturday, November 19, 2011

Redo Blog #2: We Evolve as Technology Evolves


 It seems like yesterday when the first ipod came out, offering an alternate of music listening to radios and CD walkmans. Nowadays we have even more high tech gadgets the likes of iPod’s and phones with multiple technological abilities. It is here where these things have taken flight, offering all sorts of goods and services, much to users benefit. As Rheingold detailed in his excerpt, How to Recognize the Future When It Lands on You, when he “began to notice people on the streets of Tokyo staring at their mobile phones instead of talking to them,” that the next phase of technology was beginning to wave through. The wave of new communication has established peer-to-peer networks, through exchanging “short text messages” as well as using the internet to connect with others.  Though these may seem like an important step in the technology realm, Rheingold states that it’s merely “a small harbinger of more profound changes to come” some which are beginning to reveal themselves today.
Through the mobile communication capabilities, groups like flash mobs are able to quickly connect amongst each other. They have taken it a step further though as they do not just use a “short messaging system” via texts, but they also use blogs, email, Wi-Fi, and webcams to spread news of where the Mob will meet and what they themselves will do. An example can be seen with Improv Everywhere’s flash mob that gathered hundreds of individuals to Grand Central Station in New York City, where they performed a skit as Frozen travelers. With out mobile communication via cell phones and the Internet, performing the skit would not even have been possible. This instance is only one example of man evolving as technology evolves. The trend of this evolution is on display in workplaces, schools, and all parts of society each and every day.
              It has been a little over a decade since Rheingold had first witnessed cell phones users observing the screens of their phones while admiring texts. Technology has evolved very fast and brought much to users delight through its multifaceted features. As each day progresses newer features are added to, gaining popularity and diminishing use of the less capable features. Though the benefits added daily may at the time seem revolutionary, in the end the are all just merely small harbingers with “more profound changes to come”. Those changes beginning to take affect are on our full display by smart mobs like Improv Everywhere, who continue to interact through mobile communication. From banding together and connecting with each other through cell phones, Wi-Fi, and the Internet, people are able to effectively evolve as technology evolves, continuing to use what’s well liked while also awaiting change still to come.

Friday, November 11, 2011

Technology Spring Boards the Future


            The future is fast approaching with the technology standpoint indeed. It seems like yesterday when the first ipod came out, offering an alternate of music listening to radios and CD walkmans. Nowadays we have even more high tech gadgets the likes of the iPod nano’s, iPod touch’s, iPod shuffle’s, and even iPhones. It is here where not only the iPhone but additional phones have taken flight, offering all sorts of goods and services, much to users benefit. As Rheingold detailed in his excerpt, How to Recognize the Future When It Lands on You, when he “began to notice people on the streets of Tokyo staring at their mobile phones instead of talking to them,” that the next phase of technology was beginning to wave through. He continued that exchanging “short text messages” is merely “a small harbinger of more profound changes to come” some which are beginning to reveal themselves today.
            A recent statistical analysis of society revealed that roughly 70 % has some type of mobile cellular phone. From this then, take into account how many of those phones are the up to date, popular ones complete with all new features. This instance is what Rheingold had been talking about, the shift into new age technology. Nearly every phone contains text messaging, which in some cases is even cheaper than phone conversations. The sudden convergence of the “cellphone/iPod combo points to a growing reality”, that little wireless devices are capable of immense computing power. Phones now are complete with Internet capabilities for users to surf the web, access their social networks, or look up information readily from their handheld phone. Cell phones have the ability to download games and screen savers, and also contain GPS systems to help find a route or how far a user is away from a given destination.  These  technology features of today’s cell phones offer a vast array of benefit to cellular users, making it easy to access personal and public information at their fingertips. Cell phones and mobile access have come quite a long way since Rheingold first encountered it in 2000.
            It has been a little over a decade since Rheingold had first witnessed cell phones users observing the screens of their phones while admiring texts. Technology has evolved very fast and brought much to users delight through its multifaceted features. As each day progresses newer features are added to cellular phones, gaining popularity and diminishing use of the less capable features. Though the benefits added daily may at the time seem revolutionary, in the end the are all just merely small harbingers with “more profound changes to come” slowly spring boarding technology towards the future.

Thursday, November 10, 2011

Redo Blog #1: AIM Project


            In Sherry Turkle’s “Life on the Screen”, Turkle chronicles life in cyberspace and the way that individuals interact through out their computer networking. In the case of the MUDs, people essentially create their own collaborative virtual community. Through the virtual community, players can collectively create, maneuver, and actively discuss on a daily basis. Over time, familiarity makes usage of the virtual systems easier as individuals networking the system gradually become more comfortable. From further honing of the systems, the virtual characters develop their own identity and selves. According to Turkle, “As players participate, they become authors not only of text but of themselves, constructing new selves through social interaction”(12). From the continuous interaction that players have with the various virtual systems, they do indeed create players that reflect themselves or an individual of their liking. This statement holds very true in terms of the recent aim interaction.
            Each person in class was given the assignment to create their own virtual persona. Male, female, tall, short, fat, skinny, regardless of what they created it was all in fun of the virtual reality. We were required to have a specific background of our created aim character, complete with a brief life story consisting of what they look like, where they are from, what they enjoy, and what they do not enjoy. The character I created was named Maribel, a grade school lunch lady from West Virginia. Maribel ended up talking with only one individual who happened to be a drug dealing, ex NFL hoodlum named Tyrone. Boy, did it create quite interesting conversations, ones full of some memorable quotes and statements. It was from the discussions with Tyrone that I definitely felt that I had seriously constructed a “new self” in Maribel throughout the specific interaction with Tyrone.
            From continued chatting with my alternate aim partner it became more evident that our created selves did indeed take on virtual personas. I myself personally felt that I put significantly more effort into making my discussions more realistic throughout my social interaction. By chatting often I was able to actively continue the conversations as my virtual being, adding more information to make it as realistic as possible. The more specific I became, and the further in depth with my created character I went, the more the virtual reality became somewhat of a reality. Through the project it became more evident that Sherry Turkle’s statement that the players also “become authors not only of text but of themselves,” held quite true. I myself did in fact not only author my aim character throughout the text, but also gave it more of a self throughout detailed characteristics. Being the author of the virtual character persona, I felt myself transpiring the virtual into reality from the in depth aim conversations.

EXTRA BLOG * Sexual Predators Infest Internet


Amid the turmoil and the recent allegations posed against the Penn State football program, the quite controversial discussion of sexual predators has been a thorn in the side of society for many, many years. This instance, more popularized because it’s happening to a well-publicized figure, is merely one instance of an occurrence that’s happens daily worldwide. Sexual abuse has evolved as technology has evolved, being soon in different formats and being used through types of social media.  A main cog in sexual predation has been due to the rise of the Internet and how it is used in family households today.
            Even though computers provide an insurmountable amount of help and provide several resources to us, they also provide danger for homes full of young children and teens. A recent study done by SentryPC garnered some eye-popping statistics. The company sent out questionnaires and also went door to door asking for web users to fill out surveys. What was found may cause parents and guardians to become more aware of the things their children are doing on the Internet and whom they talk to via their social networks.
            The staggering statistics revealed these alarming facts. One in every five teens who use the Internet stated that they received some form of sexual solicitation, asking for sexual information and engagement. Twenty five percent of those children are exposed to pornographic material, and seventy five percent are wiling to share personal info in exchange for goods. Additionally one in every thirty youth says that they have encountered sexual solicitation aggressively in the last year. And lastly, one of the most eye popping of all is that only 1 in every 3 households are using some type of block or filtering system to protect their children.
            The statistics not only reveal those facts, they also reveal just how dangerous anything you do on the web is.  Even amongst those who don’t intentionally mean to come across sexually, if the wrong person views a questionable comment or observes a questionable interaction they could very well report it to police. This is why when surfing the net you need to be cautious for your children and family members, but also yourself as well. Having a filter in place may not completely protect a child, but it will be more beneficial to have one rather than not having one in place at all.

Wednesday, November 9, 2011

EXTRA BLOG * Ilegal Downloading: It Can Cost You Dearly


You hear a song that you like that sounds pretty upbeat with some catchy lyrics, most would decide to get it for there IPod or mp3 gadget. Nowadays most do not want to pay though, meaning that a seemingly easy online download would be feasible. Wait right there though, as it could cost you, in some instances pretty heftily.
In the case of Joel Tenenbaum, he was charged anywhere from 67, 500-675,000 dollars in what was deemed as unconstitutionally excessive illegal music downloading. At first it appeared Tenebaum would not be seen as liable and the jury would let him slide. However, the Recording Industry Association of America demanded a review and the court of federal appeals decided that Tenebaum would be responsible. Tenebaum, who was a grad student at Boston University, had his lawyers vigorously fight that the Digital Theft Deterrence Act, as well as the federal copyright laws were not supposed to have been a target of the consumer. Those who represented the RIAA rebuttal stated that the economic impact of the downloading of illegal files was in a greater capacity than sharing a single tune. Because of this, Tenebaum’s charge could simply not be diminished.
Though it is merely one individual, Tenebaum’s case sent shockwaves throughout his entire campus, as well as many colleges on the East coast revealing that illegal downloading is a serious problem amongst college campuses. The RIAA has been pressing this issue immensely ever since the web has been used for music downloading. This case, when first presented to them, was one that would send a message to all consumers or illegal downloading, letting them know that they could very well be next, having there actions cost the dearly.

Friday, November 4, 2011

Social Networking Dangers


            Myspace, aim accounts, msn messenger, and facebook. These are just some of the social networks that are popularly used to talk amongst peers, family, as well as friends. These domains can be used for positive social means, and unfortunately negative social means as well. They can be used so individuals can express themselves or used to manipulate a group or individual. In the case of Megan Meir, she was the individual who was clearly manipulated. Her suicide, caused by cyber bullying, grabbed national attention creating quite a stir amongst parents of children who often used these social networks. Having grown up as an individual who used nearly everyone of these networks, it became eye opening to myself and to my siblings of how dangerous these networks could really be, in the present and possible future as well. It now, more than ever has become so crucial for users to watch what the post or comment on as it could put them in some type of danger.
            Social networking has engulfed today’s teen. Studies according to common sense media state that more than half of every teen feels compelled to check their media site every single day. Its mainstay in culture as repeated before has benefits, as well as determents that can potentially affect individuals now or later in their future. Minus the Internet predation, which definitely should not go unnoticed amongst those who use these sites, there are additional reasoning’s as to why social networking can be dangerous for the user. In a study conducted by Kaplan in 2008, "one in 10 college admissions officers routinely check out college applicants' Facebook and Myspace pages". They want to get a better understanding of the individual, and what better way than to look at a social network they use and update daily. Not only do undergraduate admissions do this, but also graduate admissions as well as prospective employers often surf networking sights to better evaluate candidates. Adding to the networking surfers are attorneys and lawyers. Whenever a case is received, the respective lawyers research for information of all those involved. A case involving a Rhode Island student’s drunk driving incident resulted in having him being sentenced to prison, when his original sentence was much shorter. This was because his facebook page featured him partying merely days after he left a woman clinging to life in the hospital after his reckless car accident, revealing to the judge that he showed no remorse. Other instances include child pornography cases that can also have legal issue, if individual’s nude or scantly clothed photos surface with out permission.
These are merely minor examples of social networking that can be great danger to users, potentially leading to consequences in the present or down the road. What an individual does will could affect their acceptance, it could lead to cyber bullying, and it could leave a blemish on their legal record for the rest of their life. It is extremely vital to any user of social networks to be very cautious with what they say and do on their specific sight. They need to make sure they steer clear of the dangers, and safely use their social networks.

Friday, October 28, 2011

Time Will Tell If Google's Privacy Policy Remains Private


            When thinking of Internet websites and search engines almost immediately the first thing to come to mind is Google. Yes, Google, the #1 search engine and unquestionably the most frequently used site has revolutionized people’s ability to find answers to questions or information on certain topics. Google offers just as its mission statement says, “to organize the world’s information and make it universally accessible and useful” (Vaidhyanathan- Googilization of Everything). Google has become a constant part of daily culture to everyone who has access to the Internet. It’s programs under the Google name such as G-Mail, YouTube, as well as Google Chrome and Google Maps, display just how revolutionized search engines have become due to being more convenient for users. Though Google may seem to be more convenient for users it also has the ability to enter into ones private life. It claims to have privacy settings however, Google’s ability to manipulate users gives it “pretty much a lack of privacy.” Its ability to scam personal data from intimate networks reveal behavior that has not gone unnoticed by users all across the globe.
            Google’s manipulation and inappropriate behavior with its users came to boiling point with unsatisfied users in Germany and Google’s program “Street View”.  Minister Ilse Agner was quoting saying “Google has for years penetrated private networks, illegally”.  According to the report, only two weeks previous Google had been telling German consumer protections authority “that it was only recording the network’s names and addresses” when they were gathering even more personal data as well. Google’s rapid collection of personal information from Wi-Fi networks is simply an inappropriate behavior because they take advantage of users personal information. Due to uproars like this and several others that question the privacy claims of the search engine, Google said it will introduce an option that will allow “users to encrypt searches on its website as an added protection against unauthorized snooping”, however further personal information will need to be provided in doing so, causing many to question Google’s attempt at another user privacy claim.
            Google is a search engine that will continue to be used, however as it revolutionizes so do other search engines as well. It seems that only future use will show how stable Google and it’s user privacy is and will remain. Thus far its inability to affectively notify users for info and in turn hack into users personal information is clearly instability on the websites parts. It will be interesting to see if the encrypting of searches will have a positive or negative effect for Google and its users. The only thing one can do is continue to use the website hoping for improved privacy or use an alternative search engine. Time will tell if Google’s privacy policy will in fact remain private.
           

Monday, October 24, 2011

Online Sharing Aids Musicians


No matter who you are, each person in our digital cultures class is a pirate. We ourselves have all contributed to “every important sector of big media today-film, records, radio, and cable TV”, each being born by so-called piracy (Lessig-Free Culture). So what exactly is piracy and how does it make individuals a pirate? Well friends, piracy occurs when an individual, without permission, uses another’s creative property. Now can we all honestly say that we have not done this? (No hands go up…) Exactly! When a song is heard on the Internet that catches the interest of one person, they in turn inform others, who then inform others. This, yet a case of piracy, is an example of how online sharing can benefit an artist. The Internet is a main catalyst for allowing the public to hear new independent artists. The exposure that the artists receive from online sharing of music is definitely beneficial towards them spreading their name and gaining them fame. Though in the eyes of the recording company, the online sharing may seem detrimental, in actually it is an advantage for the recording artists themselves.
            The truth is that the free downloading of music by no means “destroys sales” or “ruins the music industry” as recording labels may claim. In fact, it helps sales, maybe not immediately, but in the future. It can be thought about though personal experience. An individual may hear a song from an artist through a friend, causing them to get a free download. Gradually they inform others, while also listening to other songs from the artist. Soon they find the artist is touring and they go see a concert, paying for a ticket and also possibly purchasing memorabilia at the concert. This doesn’t even include the iTunes purchases, or CD purchases from gained popularity after individuals continue to spread artist’s notoriety. In fact, Janis Ian, the recording musician who authored the reading from class stated that she found “every time we make a few songs available on my website, sales of all CD’s go up. A lot,” further detailing that free downloading is a clear benefit to the artist.
            Ian added that the main way an artist can become successful is through one thing, exposure. As she details, “without exposure, no one comes to shows, no one buys CDs”. In her experience she said she has had several encounters with fans who said, “they came to a show because they’d downloaded a song and gotten curious”, yet another testament to the benefit of free downloading (Ian-Internet Piracy).
            Ian’s articles, as well as similar artists accounts, clearly reveals that they artists themselves are not the ones negatively affected by free online sharing. They in turn are positively affected allowing their name to gain recognition, and their music to catch on with fans for years to come.

Friday, October 14, 2011

Flickr Fun


This past week, the class project was one that broadened technological horizons, for me especially. Having never truly used flicker until recently for the assignment, I was opened to several different things, which to me presented myriad opportunities for avid picture takers and photographers.  Our group gathered together and began to piece together what story we would be telling. After jotting down ideas and discussing what type of angles and pictures we were thinking of, our projected story finally was decided and the fun began.
The story Above the Influence summarized the first person view of the life of a college student, and the affects his decisions at a party would have on him. Through 2 sets of 5 pictures our group displayed a student studying, entering a party, accepting or not accepting a drink and joint, vomiting or helping a friend, and then waking up in the morning in bed or outside. From each picture, the story came to life. By using various lighting effects along with some color aspects the pictures greatly displayed what emotion or depictions we wanted to display. The fun of putting the story together and ultimately finishing it on flickr, made it look pretty cool.
Having never personally used flickr before at first it was adjustment, but after thorough navigation throughout the entire website it became clearer what the directions were, and how to upload photos. After finally figuring it out, use of flickr came rather easily. Uploading photos and creating sets was truly not difficult at all. Having the ability to easily upload pictures from users and successfully using flickr is a very effective tool in many different aspects. It can be used in political campaigning, journalism aspects, in showing support for a respective team or group, as well as being effective for showing family and friends photo’s of one’s family events such as a birth or wedding. Flickr’s easy maneuverable ability allows for not only regular users, but new users as well to share useful content amongst each other efficiently.
Though the familiarity with the website may not come as quickly as some may hope, there is no need to panic as several resources for flickr “aid” are across the internet. As noted in PBworks web page, Flickrfun, even when one struggles with usage of the flickr website, there is always support from other users who even give ideas and strategies to make fun in the flickr world more readily. In the words of the sombrero wearing young girl, “Flick is so much fun!”

Friday, October 7, 2011

The Aid of the Internet


The 2008 United States election was a historic event in all accounts. It was a promotion of change. It presented an opportunity for the youth to reestablish themselves as a powerful voice in the electoral process. It also provided the chance for an African American president to live in the White House. The progression of media from the first televised debate to the most recent 2008 election has brought a vast amount of new age technology. Most notably, that technology has to be the internet and the use of social networking.
The use of social networking in politics truly took off during the republican campaign of Howard Dean. Chronicled in Jenkins Photoshop for Democracy, Dean was running for the republican ballot and his campaign manager, Joe Trippi, found it essential to promote his candidate through the “grass roots” system. His campaign team used several online strategies such as “blogging to create a more intimate, real-time relationship with his supporters.” Additionally their use of “Meetup.com” enabled them the ability “to quickly launch rallies, drawing together thousands of people at a time,” clearly actively engaging supporters through an immediate online connection. This, as Trippi explains, is “where the politics of television gave way to the politics of the internet,” a tactic used mightily in the election of the 44th president, Barack Obama.
Obama’s campaign, according to e-poltics, had four key moments where the usage of online networking willed him into the United States presidency.  First, Barack’s ability to fundraise online, allowed “the political professionals to take notice”. His ability to out fundraise his main democratic opponent, Hilary Clinton, turned the eyes of many. It vaulted Obama, helping him create “the network of grassroots organizers that would see him through the next pivotal time.” The networking increased as he gained supporters and momentum. Through his online organizations and via email to his supporters, Obama progressed through stage after stage, winning democratic caucuses due in large part to the online support. His campaign team organized the “MyBarackObama tool kit”, used by his key supporters. The “MyBarackObama tools were vital, since they let volunteers create the initial supporter networks” thus spring boarding him even more as he gained the name on the Democratic ballot. The volunteer organization “essentially built the campaign a structure in places where it didn’t exist”. Without this coupled with the continued online donations Barack could have frizzled out rather quickly.
As election time neared Obama’s campaign continued to progress, actively receiving donations and gaining numerous supporters. When eventually he had won the election, experts looked back at how each candidates teams help promote their respective candidate.  Statistics came back saying that Barack’s campaign contacted 27 percent of the voters, whereas McCain’s contacted roughly 19 percent. This, with great reason, was legitimately a result of email-forwarders, Facebook-status-changers” along with the millions of online donations used to fund the online organizations. Essentially, without the use of the internet and its social networking, Obama may have never won his caucuses, let alone out fund Hilary Clinton. The use of the internet and networking defiantly created a new chapter into the array of politics and its progression of campaigning.

Saturday, October 1, 2011

Citizen Journalism- The Next Generation?

      As a reader of news, what do individuals want out of their stories? Is it a detailed description? A personal account? Live in depth coverage? Or audio and video footage? What if someone could report news with all of the above? Granted accuracy and legitimacy is always of high importance but what if it was the only available report, the only available on scene resource. This, friends, is citizen journalism. Having all of these abilities to contribute to mass media news is essential especially in today’s day and age. The resources to some may seem invalid, but in select scenarios the citizen journalist is quite beneficial. This is why Andrew Keen’s statement, in The Noble Amateur, that citizen journalists “simply don’t have resources to bring us reliable news,” and “access to information” is not entirely accurate.
            Matt Wisniewski, a citizen journalist, has a video that proves otherwise to Keen’s comments. Matt’s powerful 5 minute video chronicles the Budget Repair Protests at the Wisconsin Capital in Madison. Yes, the news teams can provide what was occurring throughout the day, but they could not provide the perspective that Matt shows inside the capital. This is merely only one example of the citizen journalist being effective. Others include Mr. Glenn Reynolds, the writer for Instapundt. His journalistic ability allowed him and his writings to gain much recognition post 9/11 and in 2004 he was awarded Web Technology’s Media and Journalism award, although he himself was not a news journalist. Citizen journalism has not stopped there. In some instances news stations ask the public for video, photo, or even audio accounts of key events that they want to report on. They accept these from the public; they accept these from the citizen journalist.
            Citizen journalists not only contribute to the daily TV news, radio news, newspapers, and web news. They go further, offering different perspectives that the public can relate to. They write on blogs such as Northwest Voice in Bakersfield, California. They send letters to the editor, possibly reinforcing a story, or even countering it. Citizen journalist’s role has changed over the year. Yes, some of their stories and input is not needed, but the citizen journalist is not a person who does not matter. They in select cases are essential in bringing news to the forefront. Sharing news to the public’s ear and eye.

Monday, September 26, 2011

Blog # 1: Sherry Turkle's "Life On The Screen"


           In Sherry Turkle’s “Life on the Screen”, Turkle chronicles life in cyberspace and the way that individuals interact through out their computer networking. In the case of the MUDs, people essentially create their own collaborative virtual community. Through the virtual community, players can collectively create, maneuver, and actively discuss on a daily basis. Over time, familiarity makes usage of the virtual systems easier as individuals networking the system gradually become more comfortable. From further honing of the systems, the virtual characters develop their own identity and selves. According to Turkle, “As players participate, they become authors not only of text but of themselves, constructing new selves through social interaction”(12). From the continuous interaction that players have with the various virtual systems, they do indeed create players that reflect themselves or an individual of their liking. This statement holds very true in terms of the recent aim interaction.
            While chatting with my alternate aim partner it became evident that our created selves did indeed take on virtual personas. I myself personally felt that I put significantly more effort into making my discussions more realistic throughout my social interaction. By chatting often I was able to actively continue the conversations as my virtual being, adding more information to make it as realistic as possible. The more specific I became, and the further in depth with my created character I went, the more the virtual reality became somewhat of a reality. Through the project it became more evident that Sherry Turkle’s statement that the players also “become authors not only of text but of themselves,” held quite true. I myself did in fact not only author my aim character throughout the text, but also gave it more of a self throughout detailed characteristics.